module
Docker Container Escape Via runC Overwrite
| Disclosed | Created |
|---|---|
| Jan 1, 2019 | Jul 1, 2021 |
Disclosed
Jan 1, 2019
Created
Jul 1, 2021
Description
This module leverages a flaw in `runc` to escape a Docker container
and get command execution on the host as root. This vulnerability is
identified as CVE-2019-5736. It overwrites the `runc` binary with the
payload and wait for someone to use `docker exec` to get into the
container. This will trigger the payload execution.
Note that executing this exploit carries important risks regarding
the Docker installation integrity on the target and inside the
container ('Side Effects' section in the documentation).
and get command execution on the host as root. This vulnerability is
identified as CVE-2019-5736. It overwrites the `runc` binary with the
payload and wait for someone to use `docker exec` to get into the
container. This will trigger the payload execution.
Note that executing this exploit carries important risks regarding
the Docker installation integrity on the target and inside the
container ('Side Effects' section in the documentation).
Authors
Adam Iwaniuk
Borys Popławski
Nick Frichette
Christophe De La Fuente
Spencer McIntyre
Borys Popławski
Nick Frichette
Christophe De La Fuente
Spencer McIntyre
Platform
Linux,Unix
Architectures
cmd, x64, x86
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.